File name:

f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070

Full analysis: https://app.any.run/tasks/7221a559-4f02-47b5-bd25-eacf0638e313
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: January 11, 2025, 01:29:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
sainbox
rat
gh0st
vmprotect
rdp
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

588A3D3EC2A1E9967EA4C8A0BD492558

SHA1:

EBC484B0BE32A74A13D5FC00D2D604FB6495A58C

SHA256:

F7E1327208F06E5CDD6BBF11568A3AFAF6C8902F1B7F24C3DD304737F1759070

SSDEEP:

49152:ZaKoXA2V5VqZMBys8KZB6j/uDGspoHc+bi3vt2NCjE2NWgwvnfKKoTCZ+gKyEYV0:ZaKr2VHqZMR8KZB6j/vHc+bilgWEqWgV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 440)
    • Creates or modifies Windows services

      • AK47.exe (PID: 396)
    • GH0ST mutex has been found

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Starts CMD.EXE for self-deleting

      • AK74.exe (PID: 4512)
    • Create files in the Startup directory

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Changes the autorun value in the registry

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • SAINBOX has been detected

      • Ghiya.exe (PID: 5640)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 512)
      • wscript.exe (PID: 644)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Executable content was dropped or overwritten

      • AK47.exe (PID: 396)
      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
      • AK74.exe (PID: 4512)
      • Ghiya.exe (PID: 5640)
    • Mutex name with non-standard characters

      • AK47.exe (PID: 396)
      • AK47.exe (PID: 3208)
    • Executes as Windows Service

      • Ghiya.exe (PID: 4764)
    • Starts CMD.EXE for commands execution

      • AK74.exe (PID: 4512)
    • Hides command output

      • cmd.exe (PID: 4592)
    • Drops a system driver (possible attempt to evade defenses)

      • Ghiya.exe (PID: 5640)
    • Application launched itself

      • Ghiya.exe (PID: 4764)
    • Creates files in the driver directory

      • Ghiya.exe (PID: 5640)
    • Creates or modifies Windows services

      • Ghiya.exe (PID: 5640)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4592)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 512)
      • wscript.exe (PID: 644)
    • The process executes VB scripts

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • wscript.exe (PID: 644)
      • wscript.exe (PID: 512)
    • There is functionality for taking screenshot (YARA)

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • There is functionality for enable RDP (YARA)

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Connects to unusual port

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
  • INFO

    • The sample compiled with chinese language support

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
      • AK47.exe (PID: 396)
    • Reads the computer name

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
      • AK47.exe (PID: 396)
      • AK74.exe (PID: 4512)
      • Ghiya.exe (PID: 4764)
      • Ghiya.exe (PID: 5640)
    • Checks supported languages

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
      • AK47.exe (PID: 3208)
      • AK47.exe (PID: 396)
      • AK74.exe (PID: 4512)
      • Ghiya.exe (PID: 5640)
      • Ghiya.exe (PID: 4764)
    • Process checks computer location settings

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Create files in a temporary directory

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • The process uses the downloaded file

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • Creates files or folders in the user directory

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • VMProtect protector has been detected

      • f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe (PID: 3988)
    • UPX packer has been detected

      • Ghiya.exe (PID: 5640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:03:29 14:48:39+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 3530752
InitializedDataSize: 835584
UninitializedDataSize: -
EntryPoint: 0x2dfb0a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 1.0.0.0
FileDescription: Windows 配置程序
ProductName: Windows 核心进程
ProductVersion: 1.0.0.0
LegalCopyright: 作者版权所有 请尊重并使用正版
Comments: 本程序使用易语言编写(http://www.eyuyan.com)
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
12
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start #GH0ST, RAT f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe ak47.exe no specs ak47.exe ak74.exe ghiya.exe no specs cmd.exe no specs #SAINBOX ghiya.exe conhost.exe no specs ping.exe no specs wscript.exe no specs wscript.exe no specs f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440"C:\Users\admin\Desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe" C:\Users\admin\Desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3988"C:\Users\admin\Desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe" C:\Users\admin\Desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
3208"C:\Users\admin\AppData\Local\Temp\AK47.exe" C:\Users\admin\AppData\Local\Temp\AK47.exef7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
User:
admin
Company:
FEIM Studios
Integrity Level:
HIGH
Description:
A Free Enterprise Instant Messenger
Exit code:
0
Version:
3, 5, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\ak47.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
396C:\Users\admin\AppData\Local\Temp\\AK47.exeC:\Users\admin\AppData\Local\Temp\AK47.exe
f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
User:
admin
Company:
FEIM Studios
Integrity Level:
HIGH
Description:
A Free Enterprise Instant Messenger
Exit code:
0
Version:
3, 5, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\ak47.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4512C:\Users\admin\AppData\Local\Temp\\AK74.exeC:\Users\admin\AppData\Local\Temp\AK74.exe
f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ak74.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4764C:\WINDOWS\SysWOW64\Ghiya.exe -autoC:\Windows\SysWOW64\Ghiya.exeservices.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\windows\syswow64\ghiya.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4592C:\WINDOWS\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\admin\AppData\Local\Temp\AK74.exe > nulC:\Windows\SysWOW64\cmd.exeAK74.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5640C:\WINDOWS\SysWOW64\Ghiya.exe -acsiC:\Windows\SysWOW64\Ghiya.exe
Ghiya.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Modules
Images
c:\windows\syswow64\ghiya.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
3608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4188ping -n 2 127.0.0.1 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 609
Read events
4 589
Write events
20
Delete events
0

Modification events

(PID) Process:(396) AK47.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é
Operation:writeName:Description
Value:
¹ÜÀí»ùÓÚ×é¼þ¶ÔÏóÄ£Ð͵ĺËÐÄ·þÎñ¡£Èç¹û·þÎñ±»½ûÓ㬼ÆËã»ú½«ÎÞ·¨Õý³£ÔËÐС£
(PID) Process:(396) AK47.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters
Operation:writeName:ServiceDll
Value:
C:\WINDOWS\system32\1272171.txt
(PID) Process:(396) AK47.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Svchost
Operation:writeName:Ö÷¶¯·ÀÓù·þÎñÄ£¿é
Value:
Ö÷¶¯·ÀÓù·þÎñÄ£¿é
(PID) Process:(4512) AK74.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:MarkTime
Value:
2025-01-11 01:30
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Type
Value:
2
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Start
Value:
1
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ErrorControl
Value:
0
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ImagePath
Value:
system32\DRIVERS\QAssist.sys
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:DisplayName
Value:
QAssist
(PID) Process:(5640) Ghiya.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Group
Value:
FSFilter Activity Monitor
Executable files
7
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
396AK47.exeC:\Windows\SysWOW64\1272171.txtexecutable
MD5:8EAAE0C0A7945BB10D1EFB12D74C2324
SHA256:942A7DE2DD0EAE7DC7DFB77A90C433518754B11A17BF08DB1855DD1ACC37ACD1
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnkbinary
MD5:D513248FB3F8CB7007AB16B6EA19571E
SHA256:FAD56F60D81B4FA49870BF50EFAA2C380BFC3F6A3A5B7ADD4EF0FC43A905AFDA
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Roaming\svchcst.exeexecutable
MD5:588A3D3EC2A1E9967EA4C8A0BD492558
SHA256:F7E1327208F06E5CDD6BBF11568A3AFAF6C8902F1B7F24C3DD304737F1759070
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Roaming\Microsoft\svchcst.exeexecutable
MD5:CCDEADDC873F03D600269ADC551CF23A
SHA256:9806B54CAA07D7B114C24066265D22DD880BBAEBEE22EA20DD11727DB9D57423
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbstext
MD5:17FE7BF9D8BBAD6AD6F80B1423CDD674
SHA256:DF0CDC607EFF62AFDF6ABE55DA5A2BB5DB531FD7B3C730793AE892F7921773C0
396AK47.exeC:\Windows\SysWOW64\ini.initext
MD5:01C3085DD42DE4AECF03F81708411872
SHA256:8A2548B891036C71F80A3F765914092EE42340421E2B04374FC9F1247FE1F4C2
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Roaming\Microsoft\Config.initext
MD5:29CE53E2A4A446614CCC8D64D346BDE4
SHA256:56225BE6838BC6E93EA215891EACF28844AE27A9F8B2B29BF19D3A8C2B1F58DF
4512AK74.exeC:\Windows\SysWOW64\Ghiya.exeexecutable
MD5:B0998AA7D5071D33DAA5B60B9C3C9735
SHA256:3080B6BB456564899B0D99D4131BD6A0B284D31F7D80EF773E4872D94048D49A
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Local\Temp\AK74.exeexecutable
MD5:B0998AA7D5071D33DAA5B60B9C3C9735
SHA256:3080B6BB456564899B0D99D4131BD6A0B284D31F7D80EF773E4872D94048D49A
3988f7e1327208f06e5cdd6bbf11568a3afaf6c8902f1b7f24c3dd304737f1759070.exeC:\Users\admin\AppData\Local\Temp\AK47.exeexecutable
MD5:423EB994ED553294F8A6813619B8DA87
SHA256:050B4F2D5AE8EAECD414318DC8E222A56F169626DA6CA8FEB7EDD78E8B1F0218
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
24
DNS requests
37
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2092
RUXIMICS.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2092
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4308
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4308
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4308
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2092
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4308
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2092
RUXIMICS.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.131
whitelisted
google.com
  • 142.250.186.110
whitelisted
cf1549064127.f3322.net
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
self.events.data.microsoft.com
  • 20.189.173.10
whitelisted

Threats

No threats detected
No debug info